
MULTIPLE INPUT MULTIPLE OUTPUT (MIMO) – Understanding Network and Security for Far-Edge Computing
MIMO is a method of increasing the effective capacity of a radio link by deliberately exploiting multipath propagation. This is typically accomplished via the use of multiple transmitters and receivers on both sides 6: 6 Some implementations have a single antenna on one side and multiple antennas on the other. Figure 3.16 – MIMO exploiting
Modulation – Understanding Network and Security for Far-Edge Computing
To transmit information using a radio wave, we need to modify that wave somehow to encode our data. There are three aspects of a signal that can be modulated: Amplitude-shift keying (ASK): Modulation is based on the power or intensity of the signal. AM radio uses this method: Figure 3.8 – Amplitude modulation Frequency-shift keying
Introduction to radio frequency (RF) communications – Understanding Network and Security for Far-Edge Computing
Edge computing in situations where reliable, high-speed internet access is not a given due to location or the nature of the devices involved are known as far-edge use cases. Examples include a mobile data center for disaster response, remote sensors for smart agriculture, a pilot station for a military UAV, or content delivery onboard a
Addressing TCP issues with HTTP/3 and QUIC – Understanding Network and Security for Near-Edge Computing
HTTP/3 – Hypertext Transfer Protocol version 3 This is the latest revision of the HTTP protocol and is widely used for communication between web browsers and servers. It is based on Quick UDP Internet Connections (QUIC), a transport protocol developed by Google. QUIC is designed to provide a secure and efficient transport layer protocol over
Steering traffic at the network layer with IP Anycast – Understanding Network and Security for Near-Edge Computing
IP Anycast is another common approach for global traffic distribution. Figure 2.13 depicts an example of how it works: Figure 2.10 – IP Anycast Both servers have a public IP address of 144.12.11.5. Customers are automatically routed to the closest one. This makes DNS simple; you just need a single A record for myapp.io pointing
IP geolocation database – Understanding Network and Security for Near-Edge Computing
Several companies maintain databases that map IP ranges to physical locations and update this data at regular intervals. GSLB appliances typically pay for a subscription to these feeds. But where do those companies get their data? When an ISP obtains public IP space or an ASN, it ultimately does so via the Internet Assigned Numbers
Enhanced security – Understanding Network and Security for Near-Edge Computing
SD-WAN provides built-in security features, such as end-to-end encryption and segmentation, to protect sensitive data as it traverses the network. Optimizing ingress with global server load balancing (GSLB) Consider the situation shown in Figure 2.8: Figure 2.8 – A geographically distributed application This application has a server on the west coast of the US, and
Software-defined WAN (SD-WAN) – Understanding Network and Security for Near-Edge Computing
SD-WAN is the application of SDN principles to networks outside your data center or span of control. The problems that SDN solves within your data center are even larger challenges on the internet, where you definitely won’t be given access to modify equipment you don’t own. The general idea is to implement a logical overlay
Causes of packet loss on the internet – Understanding Network and Security for Near-Edge Computing
The primary cause of packet loss on the internet is congestion or throttling at a peering point between two Autonomous Systems (ASs). ASs are typically operated by a single large organization such as an ISP, a large technology company, a cloud service provider, a university, or a government agency. Every time traffic crosses the boundary
Overview of the AWS edge computing toolbox – Getting Started with Edge Computing on AWS
The AWS edge computing strategy aims to provide a comprehensive suite of services and solutions that enable businesses to harness the power of edge computing, addressing the challenges of data processing, latency, security, and scalability. By bringing AWS services and resources closer to end users and devices, this strategy allows organizations to optimize their applications
Archives
- August 2024
- July 2024
- June 2024
- May 2024
- April 2024
- March 2024
- February 2024
- January 2024
- December 2023
- November 2023
- October 2023
- September 2023
- August 2023
- July 2023
- May 2023
- April 2023
- February 2023
- January 2023
- November 2022
- October 2022
- September 2022
- August 2022
- July 2022
- June 2022
- May 2022
- April 2022
- December 2021
- November 2021
- October 2021
- September 2021
- June 2021
Calendar
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | 2 | 3 | 4 | |||
5 | 6 | 7 | 8 | 9 | 10 | 11 |
12 | 13 | 14 | 15 | 16 | 17 | 18 |
19 | 20 | 21 | 22 | 23 | 24 | 25 |
26 | 27 | 28 | 29 | 30 | 31 |